Oracle fare poorly in Defcon 19 social engineering exercise

Hackers took part in the Defcon 19 social engineering, capture-the-flag event for the second year running in the summer, and the findings reveal organisations are highly vulnerable to social engineering - with Oracle deemed the most penetrable.

Share

Hackers took part in the Defcon 19 social engineering, capture-the-flag event for the second year running in the summer, and the findings reveal organisations are highly vulnerable to social engineering - with Oracle deemed the most penetrable.

The exercise, called "The Schmooze Strikes Back," was organised by professional social engineer Christopher Hadnagy, author of 'Social Engineering: The Art of Human Hacking' and founder of the website social-engineering.org. Hadnagy released a report on the results this week, which can be read on his web site.

Sensitive information captured

"The event built on the first year's success by expanding the number of companies we called, the requirements for contestants and the flags that were sought after," said Hadnagy. "Some of the things that just made us drop our jaw were the amount of information that is leaked all over the web; open FTPs, documents marked "CONFIDENTIAL," vendors leaking information, and much more."

Hadnagy said that contestants only saw a small amount of resistance and virtually no company shut the participants down in their efforts to collect sensitive information that could potentially be used against them in a future attack.

In all, 14 companies were contacted by participants They included Apple, AT&T, Conagra Foods, Dell, Delta Airlines, IBM, McDonalds, Oracle, Symantec, Sysco Foods, Target, United Airlines, Verizon and Walmart. There were 62 potential "flags," or pieces of sensitive information, to capture and 14 were successfully captured over two days.

Retail companies most cautious

Contestants did online research on targets and contacted them using "pretext" scenarios; pretending to be customers, employees or sales representatives from another organisation. Only four companies gave participants any resistance, said Hadnagy. The companies that callers had the most difficulty extracting data from were retail-based companies, he said. Companies like AT&T Stores, Walmart, and those which dealt with customers in retail settings were more cautious and reluctant to answer questions and inquires.

However, companies with large call centres or customer support representatives, such as those in the airline and tech industries, were the weakest, said Hadnagy.

"AT&T took the cake as being the most secure out of all with the highest rank and Oracle scored the lowest," said Hadnagy. "It seems that social engineering penetration testing is more needed than ever, but still one of the least sought after services. Reading results like this makes me wonder when corporate America will wake up and realise that without spending the time and money to test and educate, this problem will never get even a fraction better."